Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 6729896, 12 pages
https://doi.org/10.1155/2017/6729896
Research Article

A Hybrid Chaotic and Number Theoretic Approach for Securing DICOM Images

1Department of Information Technology, Thiagarajar College of Engineering, Madurai, India
2Department of Electronics and Communication Engineering, Thiagarajar College of Engineering, Madurai, India

Correspondence should be addressed to Jeyamala Chandrasekaran; ude.ect@alamayej

Received 31 July 2016; Accepted 24 November 2016; Published 12 January 2017

Academic Editor: Ángel Martín Del Rey

Copyright © 2017 Jeyamala Chandrasekaran and S. J. Thiruvengadam. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. S. V. Sathyanarayana, M. Aswatha Kumar, and K. N. Haribhat, “Symmetric key Image Encryption Scheme with key sequences derived from random sequence of cyclic elliptic curve points,” International Journal of Network Security, vol. 12, no. 3, pp. 137–150, 2013. View at Google Scholar
  2. C.-H. Yuen and K.-W. Wong, “A chaos-based joint image compression and encryption scheme using DCT and SHA-1,” Applied Soft Computing Journal, vol. 11, no. 8, pp. 5092–5098, 2011. View at Publisher · View at Google Scholar · View at Scopus
  3. A. Al-Haj, G. Abandah, and N. Hussein, “Crypto-based algorithms for secured medical image transmission,” IET Information Security, vol. 9, no. 6, pp. 365–373, 2015. View at Publisher · View at Google Scholar · View at Scopus
  4. A. Kannammal and S. Subha Rani, “Two level security for medical images using watermarking/encryption algorithms,” International Journal of Imaging Systems and Technology, vol. 24, no. 1, pp. 111–120, 2014. View at Publisher · View at Google Scholar · View at Scopus
  5. J. Fridrich, “Symmetric ciphers based on two-dimensional chaotic maps,” International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, vol. 8, no. 6, pp. 1259–1284, 1998. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  6. N. Bourbakis and C. Alexopoulos, “Picture data encryption using scan patterns,” Pattern Recognition, vol. 25, no. 6, pp. 567–581, 1992. View at Publisher · View at Google Scholar · View at Scopus
  7. J.-X. Chen, Z.-L. Zhu, C. Fu, H. Yu, and L.-B. Zhang, “A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism,” Communications in Nonlinear Science and Numerical Simulation, vol. 20, no. 3, pp. 846–860, 2015. View at Publisher · View at Google Scholar · View at Scopus
  8. G. Zhou, D. Zhang, Y. Liu, Y. Yuan, and Q. Liu, “A novel image encryption algorithm based on chaos and Line map,” Neurocomputing, vol. 169, pp. 150–157, 2015. View at Publisher · View at Google Scholar · View at Scopus
  9. Q. Liu, P.-Y. Li, M.-C. Zhang, Y.-X. Sui, and H.-J. Yang, “A novel image encryption algorithm based on chaos maps with Markov properties,” Communications in Nonlinear Science and Numerical Simulation, vol. 20, no. 2, pp. 506–515, 2015. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  10. M. A. Murillo-Escobar, C. Cruz-Hernández, F. Abundiz-Pérez, R. M. López-Gutiérrez, and O. R. Acosta Del Campo, “A RGB image encryption algorithm based on total plain image characteristics and chaos,” Signal Processing, vol. 109, pp. 119–131, 2015. View at Publisher · View at Google Scholar · View at Scopus
  11. W. Zhang, H. Yu, Y.-L. Zhao, and Z.-L. Zhu, “Image encryption based on three-dimensional bit matrix permutation,” Signal Processing, vol. 118, pp. 36–50, 2016. View at Publisher · View at Google Scholar · View at Scopus
  12. J. Hu and F. Han, “A pixel-based scrambling scheme for digital medical images protection,” Journal of Network and Computer Applications, vol. 32, no. 4, pp. 788–794, 2009. View at Publisher · View at Google Scholar · View at Scopus
  13. C. Fu, W.-H. Meng, Y.-F. Zhan et al., “An efficient and secure medical image protection scheme based on chaotic maps,” Computers in Biology and Medicine, vol. 43, no. 8, pp. 1000–1010, 2013. View at Publisher · View at Google Scholar · View at Scopus
  14. G. Liu, J. Li, and H. Liu, “Chaos-based color pathological image encryption scheme using one-time keys,” Computers in Biology and Medicine, vol. 45, no. 1, pp. 111–117, 2014. View at Publisher · View at Google Scholar · View at Scopus
  15. P. Praveenkumar, R. Amirtharajan, K. Thenmozhi, and J. B. Balaguru Rayappan, “Medical data sheet in safe havens—a tri-layer cryptic solution,” Computers in Biology and Medicine, vol. 62, pp. 264–276, 2015. View at Publisher · View at Google Scholar · View at Scopus
  16. D. Ravichandran, P. Praveenkumar, J. B. Balaguru Rayappan, and R. Amirtharajan, “Chaos based crossover and mutation for securing DICOM image,” Computers in Biology and Medicine, vol. 72, pp. 170–184, 2016. View at Google Scholar
  17. E. Yavuz, R. Yazici, M. C. Kasapbaşi, and E. Yamaç, “A chaos-based image encryption algorithm with simple logical functions,” Computers and Electrical Engineering, vol. 54, pp. 471–483, 2014. View at Publisher · View at Google Scholar · View at Scopus
  18. J. B. Lima, F. Madeiro, and F. J. R. Sales, “Encryption of medical images based on the cosine number transform,” Signal Processing: Image Communication, vol. 35, pp. 1–8, 2015. View at Publisher · View at Google Scholar · View at Scopus
  19. M. Dzwonkowski, M. Papaj, and R. Rykaczewski, “A new quaternion-based encryption method of DICOM images,” IEEE Transactions on Image Processing, vol. 24, no. 11, pp. 4614–4622, 2015. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  20. S. Zhang, T. Gao, and L. Gao, “A novel encryption frame for medical image with watermark based on hyperchaotic system,” Mathematical Problems in Engineering, vol. 2014, Article ID 240749, 11 pages, 2014. View at Publisher · View at Google Scholar
  21. J.-x. Chen, Z.-l. Zhu, C. Fu, L.-b. Zhang, and Y. Zhang, “An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach,” Communications in Nonlinear Science and Numerical Simulation, vol. 23, no. 1-3, pp. 294–310, 2015. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  22. http://mathworld.wolfram.com/PrimitiveRoot.html.
  23. W. Stallings, Cryptography and Network Security, Prentice Hall, 5th edition, 2011.
  24. http://mathworld.wolfram.com/DiscreteLogarithm.html.
  25. R. Ramasamy, A. P. Muniyandi, and I. Devi, “A new algorithm for encryption/decryption for field applications,” Computer Standards & Interfaces, vol. 31, no. 6, pp. 1069–1072, 2009. View at Publisher · View at Google Scholar · View at Scopus
  26. J. Chandrasekaran and T. S. Jayaraman, “A fast and secure image encryption algorithm using number theoretic transforms and discrete logarithms,” in Proceedings of the IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES '15), Kerala, India, February 2015. View at Publisher · View at Google Scholar · View at Scopus
  27. M. Suneel, “Cryptographic pseudo-random sequences from the chaotic Hénon map,” Sadhana, vol. 34, no. 5, pp. 689–701, 2009. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  28. F. Zheng, X.-J. Tian, J.-Y. Song, and X.-Y. Li, “Pseudo-random sequence generator based on the generalized Henon map,” Journal of China Universities of Posts and Telecommunications, vol. 15, no. 3, pp. 64–68, 2008. View at Publisher · View at Google Scholar · View at Scopus
  29. M. Usama, M. K. Khan, K. Alghathbar, and C. Lee, “Chaos-based secure satellite imagery cryptosystem,” Computers and Mathematics with Applications, vol. 60, no. 2, pp. 326–337, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  30. J. Chandrasekaran and S. J. Thiruvengadam, “Ensemble of chaotic and naive approaches for performance enhancement in video encryption,” The Scientific World Journal, vol. 2015, Article ID 458272, 11 pages, 2015. View at Publisher · View at Google Scholar · View at Scopus
  31. Y. Wu, J. P. Noonan, and S. Agaian, “NPCR and UACI randomness tests for image encryption,” Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications, vol. 2, pp. 31–38, 2011. View at Google Scholar